OIG-15-43 - Information Technology Management Letter for ... · Finding and Recommendation...

18
Information Technology Management Letter for the U.S. Citizenship and Immigration Services Component of the FY 2014 Department of Homeland Security Financial Statement Audit March 17, 2015 OIG-15-43

Transcript of OIG-15-43 - Information Technology Management Letter for ... · Finding and Recommendation...

  • Information Technology Management Letter for the U.S. Citizenship and Immigration Services Component of the FY 2014 Department of Homeland Security Financial Statement Audit

    March 17, 2015 OIG-15-43

  • HIGHLIGHTS Information Technology Management Letter

    for the U.S. Citizenship and Immigration Services Component

    of the FY 2014 Department of Homeland Security Financial

    Statement Audit

    March 17, 2015

    Why We Did This Each year, our independent auditors identify component-level information technology control deficiencies as part of the DHS consolidated financial statement audit. This letter provides details that were not included in the fiscal year (FY) 2014 DHS Agency Financial Report.

    What We Recommend We recommend that USCIS, in coordination with the DHS Chief Information Officer and the Chief Financial Officer, make improvements to its financial management systems and associated information technology security program.

    For Further Information: Contact our Office of Public Affairs at (202) 254-4100, or email us at [email protected]

    � �

    What We Found We contracted with the independent public accounting firm KPMG, LLP to perform the audit of the consolidated financial statements of the U.S. Department of Homeland Security for the year ended September 30, 2014. KPMG, LLP evaluated selected general information technology controls and business process application controls at U.S. Citizenship and Immigration Services. KPMG, LLP determined that USCIS had made improvements in designing and consistently implementing controls related to reviewing audit logs and enforcing account security requirements.

    However, KPMG, LLP continued to identify access control deficiencies related to USCIS’s core financial system. Additionally, many key financial and feeder systems have not been substantially updated since being inherited from legacy agencies several years ago. Such control deficiencies have limited USCIS’s ability to ensure the confidentiality, integrity, and availability of its critical financial and operational data.

    www.oig.dhs.gov OIG-15-43

    http:www.oig.dhs.gov

  • V~pA~~F~T7

    V OFFICE OF INSPECTOR GENERAL;" +̀•~ ~t`JQ~ De artment of Homeland SecuritP Y

    Washington, DC

    March 17, 2015

    TO: Mark SchwartzChief Information OfficerU.S. Citizenship and Immigration Services

    Joseph MooreChief Financial OfficerU.S. Citizenship and Immigration Services

    /~i ~ 2~FROM: ondra McC eyAssistant Inspector GeneralOffice of Information Technology Audits

    SUBJECT: Inforn2ation Technology Management Letter for the U. S. Citizenshipand Immigration Services Component of the FY 2014 Department ofHomeland Security Financial Statement Audit

    Attached for your information is our final report, Information TechnologyManagement Letter for the U.S. Citizenship and Immigration Services Componentof the FY 2014 Department of Homeland Security Financial Statement Audit.This report contains comments and recommendations related to informationtechnology internal control deficiencies. The observations did not meet thecriteria to be reported in the Independent Auditors' Report on DHS' FY 2014Financial Statements and Internal Control over Financial Reporting, datedNovember 14, 2014, which was included in the FY 2014 DHS Agency FinancialReport.

    The independent public accounting firm KPMG, LLP conducted the audit ofDHS' FY 2014 financial statements and is responsible for the attachedinformation technology management letter and the conclusions expressed in it.We do not express opinions on DHS' financial statements or internal control,nor do we provide conclusions on compliance with laws and regulations. Wewill post the final report on our website.

    Please call me with any questions, or your staff may contact Sharon Huiswoud,

    Director, Information Systems Division, at (202) 254-5451.

    Attachment

  • KPMG LLP Suite 12000 1801 K Street, NW Washington, DC 20006

    December 19, 2014

    Office of Inspector General, U.S. Department of Homeland Security, and Chief Information Officer and Chief Financial Officer, U.S. Citizenship and Immigration Services, Washington, DC

    Ladies and Gentlemen:

    In planning and performing our audit of the consolidated financial statements of the U.S. Department of Homeland Security (DHS or Department), as of and for the year ended September 30, 2014 (hereinafter, referred to as the “fiscal year (FY) 2014 DHS consolidated financial statements”), in accordance with auditing standards generally accepted in the United States of America; the standards applicable to financial audits contained in Government Auditing Standards issued by the Comptroller General of the United States; and Office of Management and Budget Bulletin No. 14-02, Audit Requirements for Federal Financial Statements, we considered internal control over financial reporting (internal control) as a basis for designing our auditing procedures for the purpose of expressing our opinion on the financial statements. In conjunction with our audit of the consolidated financial statements, we also performed an audit of internal control over financial reporting in accordance with attestation standards issued by the American Institute of Certified Public Accountants.

    During our audit we noted certain matters involving i nternal control and other operational matters at the U.S. Citizenship and Immigration Services (USCIS), a component of DHS, that are presented for your consideration. These comments and recommendations, all of which have been discussed with the appropriate members of management, are intended to improve internal control or result in other operating efficiencies.

    With respect to financial systems at USCIS, we noted certain internal control deficiencies in the general IT control areas of access controls and configuration management. These matters are described in the Findings and Recommendations section of this letter.

    Additionally, at the request of the DHS Office of Inspector General (OIG), we performed additional nontechnical information security procedures to identify instances where USCIS personnel did not adequately comply with requirements for safeguarding sensitive material or assets from unauthorized access or disclosure. These matters are described in the Observations Related to Non-Technical Information Security section of this letter.

    We have provided a description of the key USCIS financial system and IT infrastructure within the scope of the FY 2014 DHS financial statement audit in Appendix A, and a listing of each USCIS IT Notice of Finding and Recommendation communicated to management during our audit in Appendix B.

    KPMG LLP is a Delaware limited liability partnership, the U.S. member firm of KPMG International Cooperative (“KPMG International”), a Swiss entity.

  • During our audit we noted certain matters involving financial reporting internal controls (comments not related to IT) and other operational matters at USCIS, and communicated them in writing to management and those charged with governance in our Independent Auditors’ Report and in a separate letter to the OIG and the USCIS Chief Financial Officer.

    Our audit procedures are designed primarily to enable us to form opinions on the FY 2014 DHS consolidated financial statements and on the effectiveness of internal control over financial reporting, and therefore may not bring to light all deficiencies in policies or procedures that may exist. We aim, however, to use our knowledge of USCIS’ organization gained during our work to make comments and suggestions that we hope will be useful to you.

    We would be pleased to discuss these comments and recommendations with you at any time.

    The purpose of this letter is solely to describe comments and recommendations intended to improve internal control or result in other operating efficiencies. Accordingly, this letter is not suitable for any other purpose.

    Very truly yours,

  • Page

    Objective, Scope, and Approach 2

    Summary of Findings 4

    Findings and Recommendations 5

    Findings 5

    Recommendations 5

    Observations Related to Non-Technical Information Security 6

    APPENDICES

    Appendix Subject Page

    A Description of Key USCIS Financial Systems and IT Infrastructure 8 within the Scope of the FY 2014 DHS Financial Statement Audit

    B FY 2014 IT Notices of Findings and Recommendations at USCIS 10

    Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    TABLE OF CONTENTS

    1

  • Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    OBJECTIVE, SCOPE, AND APPROACH

    Objective

    We audited the consolidated financial statements of the U.S. Department of Homeland Security (DHS or Department) for the year ended September 30, 2014 (hereinafter, referred to as the “fiscal year (FY) 2014 DHS consolidated financial statements”). In connection with our audit of the FY 2014 D HS consolidated financial statements, we performed an evaluation of selected general information technology ( IT) controls (GITCs) and business process application controls (BPACs) at the U.S. C itizenship and Immigration Services (USCIS), a component of DHS, to assist in planning and performing our audit engagement. At the request of the DHS Office of Inspector General (OIG), we also performed additional information security testing procedures to assess certain non-technical areas related to the protection of sensitive IT and financial information and assets.

    Scope and Approach

    General Information Technology Controls

    The Federal Information System Controls Audit Manual (FISCAM), issued by the U.S. Government Accountability Office (GAO), formed the basis of our GITC evaluation procedures.

    FISCAM was designed to inform financial statement auditors about IT controls and related audit concerns to assist them in planning their audit work and to integ

    DRAFT rate the work of auditors with other aspects of the

    financial statement audit. FISCAM also provides guidance to auditors when considering the scope and extent of review that generally should be performed when evaluating GITCs and the IT environment of a Federal agency. FISCAM defines the following five control categories to be essential to the effective operation of GITCs and the IT environment:

    1. Security Management – C ontrols that provide a framework and continuing cycle of activity for managing risk, developing security policies, assigning responsibilities, and monitoring the adequacy of computer-related security controls.

    2. Access Control – Controls that limit or detect access to computer resources (data, programs, equipment, and facilities) and protect against unauthorized modification, loss, and disclosure.

    3. Configuration Management – C ontrols that help to prevent unauthorized changes to information system resources (software programs and hardware configurations) and provide reasonable assurance that systems are configured and operating securely and as intended.

    4. Segregation of Duties – C ontrols that constitute policies, procedures, and an organizational structure to manage who can control key aspects of computer-related operations.

    5. Contingency Planning – C ontrols that involve procedures for continuing critical operations without interruption, or with prompt resumption, when unexpected events occur.

    2

  • Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    While each of these five FISCAM categories were considered during the planning and risk assessment phase of our audit, we selected GITCs for evaluation based on their relationship to the ongoing effectiveness of process-level automated controls or manual controls with one or more automated components. This includes those controls which depend on the completeness, accuracy, and integrity of information provided by the entity in support of our financial audit procedures. Consequently, FY 2014 GITC procedures at USCIS did not necessarily represent controls from each FISCAM category.

    Business Process Application Controls

    Where relevant GITCs were determined to be operating effectively, we performed testing over selected BPACs (process-level controls which were either fully automated or manual with an automated component) on financial systems and applications to assess the financial systems’ internal controls over the input, processing, and output of financial data and transactions.

    FISCAM defines BPACs as the automated and/or manual controls applied to business transaction flows and relate to the completeness, accuracy, validity, and confidentiality of transactions and data during application processing. They typically cover the structure, policies, and procedures that operate at a detailed business process (cycle or transaction) level and operate over individual transactions or activities across business processes.

    Financial System Functionality DRAFT

    In recent years, we have noted that limitations in USCIS’ financial systems’ functionality may be inhibiting the agency’s ability to implement and maintain internal controls, including effective GITCs and BPACs supporting financial data processing and reporting. Many key financial and feeder systems have not been substantially updated since being inherited from legacy agencies several years ago. Therefore, in FY 2014, we continued to evaluate and consider the impact of financial system functionality on internal control over financial reporting.

    Non-Technical Information Security Testing

    To complement our IT controls test work, we conducted limited after-hours physical security testing and social engineering at selected USCIS facilities to identify potential weaknesses in non-technical aspects of IT security. This includes those related to USCIS personnel awareness of policies, procedures and other requirements governing the protection of sensitive IT and financial information and assets from unauthorized access or disclosure. This testing was performed in accordance with the FY 2014 DHS Security Testing Authorization Letter (STAL) signed by KPMG, DHS OIG, and DHS management.

    Appendix A provides a description of the key USCIS financial system and IT infrastructure within the scope of the FY 2014 DHS financial statement audit.

    3

  • Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    SUMMARY OF FINDINGS

    During FY 2014, we continued to identify GITC deficiencies at USCIS related to access controls for USCIS’ core financial system.

    The conditions supporting our findings collectively limited USCIS’ ability to ensure that critical financial and operational data were maintained in such a manner to ensure confidentiality, integrity, and availability. Of the five IT Notices of Findings and Recommendations (NFRs) issued during our FY 2014 testing at USCIS, four were repeat findings, either partially or in whole from the prior year, and one was a new finding. The five IT NFRs issued represent deficiencies and observations related to three of the five FISCAM GITC categories.

    The majority of findings resulted from the lack of properly documented, fully designed and implemented, adequately detailed, and consistently implemented financial system controls to comply with the requirements of DHS Sensitive Systems Policy Directive 4300A, Information Technology Security Program, National Institute of Standards and Technology guidance, and USCIS policies and procedures, as applicable. The most significant weaknesses from a financial statement audit perspective continued to include:

    1. Excessive, unauthorized, or inadequately monitored access to, and activity within, system components for the key USCIS financial application; and

    DRAFT 2. Configuration management controls that were not fully defined, followed, or effective.

    During our IT audit procedures, we also evaluated and considered the impact of financial system functionality on financial reporting. In recent years, we have noted that limitations in USCIS’ financial system’s functionality may be inhibiting USCIS’ ability to implement and maintain effective internal control and to effectively and efficiently process and report financial data. Many key financial and feeder systems have not been substantially updated since being inherited from legacy agencies several years ago.

    While the recommendations made by us should be considered by USCIS, it is the ultimate responsibility of USCIS management to determine the most appropriate method(s) for addressing the deficiencies identified.

    4

  • Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    FINDINGS AND RECOMMENDATIONS

    Findings

    During our audit of the FY 2014 DHS consolidated financial statements, we identified the following GITC deficiencies at USCIS:

    Access Controls

    • Access was not consistently granted with respect to the principles of least privilege, including an instance where an individual was able to access and modify their own account.

    • Account management activities on the USCIS financial system were not consistently or timely documented or implemented. These activities included revocation of access from separated or transferred Federal employees and contractors.

    Configuration Management

    • Security patch management and configuration deficiencies were identified during vulnerability assessments of system components supporting USCIS’ financial system, which are hosted and supported by the Immigration and Customs Enforcement (ICE) Office of the Chief Information Officer (OCIO) on behalf of USCIS.

    DRAFT

    Recommendations

    We recommend that the USCIS OCIO and Office of the Chief Financial Officer (OCFO), in coordination with the DHS OCIO and the DHS OCFO, make the following improvements to USCIS’ financial management system and associated IT security program (in accordance with USCIS and DHS requirements, as applicable):

    Access Controls

    • Implement or enhance existing technical controls to ensure that the principle of least privilege is enforced for all application users.

    • Implement or enhance existing technical and monitoring controls over the personnel separation process. This includes ensuring that system owners are notified and revoke access from separated or transferred personnel and contractors timely.

    Configuration Management

    • Monitor ICE OCIO’s implementation of the specific vendor-recommended corrective actions detailed in the NFR that were issued for deficiencies identified during the vulnerability assessment.

    5

  • Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    OBSERVATIONS RELATED TO NON-TECHNICAL INFORMATION SECURITY

    To complement our IT controls test work during the FY 2014 audit, we performed additional nontechnical information security procedures at USCIS. These procedures included after-hours physical security walkthroughs and social engineering to identify instances where USCIS personnel did not adequately comply with requirements for safeguarding sensitive material or assets from unauthorized access or disclosure. These procedures were performed in accordance with the FY 2014 STAL, signed by DHS OIG management, KPMG management, and DHS management (Chief Information Officer [CIO], Chief Information Security Officer, Chief Financial Officer, Chief Privacy Officer, and Chief Security Officer) on June 3, 2014, and transmitted to the DHS CIO Council on June 12, 2014.

    Social Engineering

    Social engineering is defined as the act of manipulating people into performing actions or divulging sensitive information. The term typically applies to trickery or deception for the purpose of information gathering or obtaining computer system access. The objective of our social engineering tests was to identify the extent to which USCIS personnel were willing to divulge network or system passwords that, if exploited, could compromise USCIS sensitive information.

    To conduct this testing, we made phone calls from various USCIS locations at various times throughout the audit. Posing as USCIS technical support personnel, we attempted to solicit access credentials from USCIS users. Attempts to login to USCIS systems were not performed; however, we assumed that

    DRAFT

    disclosed passwords that met the minimum password standards established by DHS policy were valid exceptions. During social engineering performed at USCIS, we attempted to call a total of 45 employees and contractors and reached 13. Of those 13 individuals with whom we spoke, one divulged their password in violation of DHS policy.

    The selection of attempted or connected calls was not statistically derived, and, therefore, the results described here should not be used to extrapolate to USCIS as a whole.

    After-Hours Physical Security Walkthroughs

    Multiple DHS policies, including the DHS Sensitive Systems Policy Directive 4300A, the DHS Privacy Office Handbook for Safeguarding Sensitive Personally-Identifiable Information (PII), and DHS Management Directive 11042.1, Safeguarding Sensitive but Unclassified (FOUO) Information, mandate the physical safeguarding of certain materials and assets which, if compromised either due to external or insider threat, could result in unauthorized access, disclosure, or exploitation of sensitive IT or financial information.

    We performed procedures to determine whether USCIS personnel consistently exercised responsibilities related to safeguarding sensitive materials as defined in these policies. Specifically, we performed escorted walkthroughs of workspaces – including cubicles, offices, shared workspaces, and/or common areas (e.g.: areas where printers were hosted) – at USCIS facilities that processed, maintained, and/or had access to financial data during FY 2014. We inspected workspaces to identify instances where materials

    6

  • Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    designated by DHS policy as requiring physical security from unauthorized access were left unattended. Exceptions noted were validated by designated representatives from USCIS, DHS OIG and DHS OCIO.

    During after-hours physical security walkthroughs performed at USCIS, we inspected a total of 45 workspaces. Of those, 13 were observed to have material – including, but not limited to, system passwords and access credentials, information marked “FOUO”, and documents containing sensitive PII– left unattended and unsecured after business hours in violation of DHS policy.

    The selection of inspected areas was not statistically derived, and, therefore, the results described here should not be used to extrapolate to USCIS as a whole.

    DRAFT

    7

  • Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    Appendix A

    Description of Key USCIS Financial Systems and IT Infrastructure within the Scope of the FY 2014 DHS Financial Statement Audit

    DRAFT

    8

  • Appendix A

    Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    Below is a description of the significant USCIS financial management system and supporting IT infrastructure included in the scope of the FY 2014 DHS financial statement audit.

    Federal Financial Management System (FFMS)

    FFMS is a mainframe-based major application and the official accounting system of record for USCIS. It is used to create and maintain a record of each allocation, commitment, obligation, travel advance, and accounts receivable issued. The system supports all internal and external financial reporting requirements.

    FFMS includes a back-office component used by the USCIS OCFO and the USCIS Financial Management Division, as well as a desktop application used by the broader USCIS user community (including the Burlington Finance Center and the Dallas Finance Center). The USCIS instance of FFMS contains no known internal or external interfaces.

    FFMS is hosted and supported by the Immigration and Customs Enforcement (ICE) OCIO on behalf of USCIS (under the terms established through a Memorandum of Understanding between the two Components), exclusively for internal use by the USCIS user community and, on a limited basis, ICE OCIO and finance center personnel performing support services for USCIS.

    9

  • Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    Appendix B

    FY 2014 IT Notices of Findings and Recommendations at USCIS

    10

  • Appendix B

    Department of Homeland Security Information Technology Management Letter U.S. Citizenship and Immigration Services

    September 30, 2014

    FY 2014 NFR # NFR Title FISCAM Control Area New Issue

    Repeat Issue

    CIS-IT-14-01 Security Awareness Issues Identified during After-Hours Physical Security Testing at USCIS

    Security Management X

    CIS-IT-14-02 Security Awareness Issues Identified during Social Engineering Testing at USCIS

    Security Management X

    CIS-IT-14-03 Deficiency in USCIS FFMS User Account Modification Process Access Controls X

    CIS-IT-14-04 Deficiency in USCIS FFMS User Account Termination Process and Attrition Process

    Access Controls X

    CIS-IT-14-05 FFMS Vulnerability Weaknesses Impact USCIS Operations Configuration Management X

    11

  • FOR

    OFFICE OF INSPECTOR GENERAL Department of Homeland Security

    Report Distribution

    Department of Homeland Security

    Secretary Deputy Secretary Chief of Staff General Counsel Executive Secretary Director, GAO/OIG Liaison Office Assistant Secretary for Office of Policy Assistant Secretary for Office of Public Affairs Assistant Secretary for Office of Legislative Affairs Under Secretary for Management Chief Privacy Officer

    U.S. Citizenship and Immigration Services

    Director Chief Financial Officer Chief Information Officer Audit Liaison

    Office of Management and Budget

    Chief, Homeland Security Branch DHS OIG Budget Examiner

    Congress

    Congressional Oversight and Appropriations Committees

    www.oig.dhs.gov� � OIGͲ15Ͳ43�

    www.oig.dhs.gov��

  • ADDITIONAL INFORMATION AND COPIES

    To view this and any of our other reports, please visit our website at: www.oig.dhs.gov.

    For further information or questions, please contact Office of Inspector General Public Affairs at: [email protected]. Follow us on Twitter at: @dhsoig.

    OIG HOTLINE

    To report fraud, waste, or abuse, visit our website at www.oig.dhs.gov and click on the red "Hotline" tab. If you cannot access our website, call our hotline at (800) 323-8603, fax our hotline at (202) 254-4297, or write to us at:

    Department of Homeland Security Office of Inspector General, Mail Stop 0305 Attention: Hotline 245 Murray Drive, SW Washington, DC 20528-0305

    http:www.oig.dhs.govmailto:[email protected]:www.oig.dhs.gov

    new FY 14 DHS USCIS ITML_FINAL.pdfTable of ContentsAppendicesObjective, Scope, and ApproachObjectiveScope and ApproachGeneral Information Technology ControlsBusiness Process Application ControlsFinancial System FunctionalityNon-Technical Information Security Testing

    Summary of FindingsFindings and RecommendationsFindingsAccess ControlsConfiguration Management

    RecommendationsAccess ControlsConfiguration Management

    Observations Related to Non-Technical Information SecuritySocial EngineeringAfter-Hours Physical Security Walkthroughs

    Appendix ADescription of Key USCIS Financial Systems and IT Infrastructure within the Scope of the FY 2014 DHS Financial Statement AuditFederal Financial Management System (FFMS)

    Appendix BFY 2014 IT Notices of Findings and Recommendations at USCIS